(12) Patent Application Publication (10) Pub. No.: US 2016/ A1

Size: px
Start display at page:

Download "(12) Patent Application Publication (10) Pub. No.: US 2016/ A1"

Transcription

1 US A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2016/ A1 ZHANG (43) Pub. Date: Sep. 8, 2016 (54) METHOD AND APPARATUS FOR USER Publication Classification IDENTITY AUTHENTICATION (51) Int. Cl. (71) Applicant: ALIBABA GROUP HOLDING H04L 29/06 ( ) LIMITED, George Town (KY) (52) U.S. Cl. CPC... H04L 63/083 ( ); H04L 63/06 (72) Inventor: Jie ZHANG, Hangzhou (CN) ( ) (57) ABSTRACT (21) Appl. No.: 15/057,584 A method for user identity authentication is provided. The method includes receiving an authentication image selected (22) Filed: Mar. 1, 2016 by a user, and acquiring, based on the authentication image, a password to be verified. The method may further include (30) Foreign Application Priority Data acquiring a preset verification password, and comparing the verification password with the password to be verified to Mar. 3, 2015 (CN)... 2O obtain a user identity authentication result. {{} Receiving an Autheatication image Selected by a User S. () Acquiring. Based on the Seiected Authentication image, a Password to Be Verified SO2 Acquiring a Preset Verification Password and Coparing the Preset Verification Password with the Password to Be Verified to Obtain a User identity Authentication Result S 3

2 Patent Application Publication Sep. 8, 2016 Sheet 1 of 5 US 2016/ A1 {}} Receiving an Authentication image Selected by a ser Acqiring, Based on the Selected Autheatication image, a Password to Be Werified Acquiring a Preset Verification. Password and Comparing the Preset Verification Password with the Password to 36 Verified to Obtain a jser icientity Athentication Result S 33 Fig. 1

3 Patent Application Publication Sep. 8, 2016 Sheet 2 of 5 US 2016/ A1 2 {} Fig. 2

4 Patent Application Publication Sep. 8, 2016 Sheet 3 of 5 US 2016/ A1 Generating a Verification Password, and Storing the Verification Password and a Hash Key Used for Generating the verification assword SO When a User is Required to input a Password, Displaying Selectable Authentication images to a User S2 Receiving an Authentication image Selected by the User S2O3 Acquiring a Password to Be verified Based on the Autheatication image Selected by the ser and a Pre S{ Stored Hash. Kcy SiO4. Acquiring a Preset Verification Password and Comparing the Preset Verification Password with the Password to Be Verified to Obtain a User identity Autheatication Result S2O)5 Resetting the Verification Password if User identity Autheatication is Passed S2O6 Fig. 3

5 Patent Application Publication Sep. 8, 2016 Sheet 4 of 5 US 2016/ A1 Receiving Module 40 Acquiring Module 420 Verification Mode 430 Fig. 4

6 Patent Application Publication Sep. 8, 2016 Sheet 5 of 5 US 2016/ A1 initializing Module 540 Second Acquiring Submodule 54 generating Shimodule S4 Second Processing Sibiidaie 54 T Display Module 560 Receiving Module 40 Acquiring Module 42) First Acquiring Submodule 52 Storing Module 55t First Processing Subnodule s Verification yiodie 430 Resetting Module 570 Fig. 5

7 US 2016/ A1 Sep. 8, 2016 METHOD AND APPARATUS FOR USER IDENTITY AUTHENTCATION CROSS-REFERENCE TO RELATED APPLICATION This application is based upon and claims priority to Chinese Patent Application No , filed Mar. 3, 2015, the entire contents of which are incorporated herein by reference. TECHNICAL FIELD 0002 The present application relates to the technical field of network security and, more particularly, to a method and an apparatus for user identity authentication. BACKGROUND 0003 Conventionally, a terminal device performs user identity authentication by users manually inputting character strings, such as numbers and letters However, authentication passwords in the form of numbers and letters may not be memorized conveniently and therefore are often be forgotten by users. Moreover, the operation of inputting these passwords is relatively cumber SO. SUMMARY The present disclosure provides a method for user identity authentication. Consistent with some embodiments, the method includes receiving an authentication image selected by a user, and acquiring, based on the authentication image, a password to be verified. The method may further include acquiring a preset Verification password, and compar ing the verification password with the password to be verified to obtain a user identity authentication result Consistent with some embodiments, this disclosure provides an apparatus for user identity authentication. The apparatus includes a receiving module configured to receive an authentication image selected by a user and an acquiring module configured to acquire, based on the authentication image, a password to be verified. The apparatus may further include a verification module configured to acquire a preset Verification password and compare the verification password with the password to be verified to obtain a user identity authentication result Consistent with some embodiments, this disclosure provides a non-transitory computer-readable storage medium having stored therein instructions. When executed by a pro cessorina device, the instructions cause the device to perform operations including receiving an authentication image selected by a user, acquiring, based on the authentication image, a password to be verified, acquiring a preset Verifica tion password, and comparing the Verification password with the password to be verified to obtain a user identity authenti cation result Additional objects and advantages of the disclosed embodiments will be set forth in part in the following descrip tion, and in part will be apparent from the description, or may be learned by practice of the embodiments. The objects and advantages of the disclosed embodiments may be realized and attained by the elements and combinations set forth in the claims It is to be understood that both the foregoing general description and the following detailed description are exem plary and explanatory only and are not restrictive of the dis closed embodiments, as claimed. BRIEF DESCRIPTION OF THE DRAWINGS The accompanying drawings, which are incorpo rated in and constitute a part of this specification, illustrate embodiments consistent with the invention and, together with the description, serve to explain the principles of the inven tion FIG. 1 is a flowchart of an exemplary method for user identity authentication, consistent with some embodi ments of this disclosure FIG. 2 is a schematic diagram of authentication images displayed to a user, consistent with some embodi ments of this disclosure FIG. 3 is a flowchart of another exemplary method for user identity authentication, consistent with some embodiments of this disclosure FIG. 4 is a block diagram of an exemplary apparatus for user identity authentication, consistent with some embodiments of this disclosure FIG. 5 is a block diagram of another exemplary apparatus for user identity authentication, consistent with Some embodiments of this disclosure. DESCRIPTION OF THE EMBODIMENTS 0016 Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. The following description refers to the accompanying drawings in which the same numbers in different drawings represent the same or similar elements unless otherwise represented. The implementations set forth in the following description of exemplary embodiments do not represent all implementations consistent with the inven tion. Instead, they are merely examples of devices and meth ods consistent with aspects related to the invention as recited in the appended claims. (0017 FIG. 1 is a flowchart of an exemplary method 100 for user identity authentication, consistent with some embodiments of this disclosure. The exemplary method 100 may be performed by a terminal device. Referring to FIG. 1, the method 100 includes the following steps In step S101, the terminal device receives an authen tication image selected by a user. FIG. 2 is a schematic dia gram 200 of authentication images displayed to a user, con sistent with some embodiments of this disclosure. For example, an application program of the terminal device may obtain a plurality of authentication images as selectable images and display them on a display of the terminal device. Subsequently, the user may select, from the displayed authen tication images, the image preset as a password image so as to perform identity authentication In some embodiments, the authentication images may be randomly selected from all of the images stored in the terminal device and may be randomly arranged The image that is presetas a password image may be placed at a random position in authentication images. In some implementations, the password image may be placed at the first page or the first few pages of all authentication images so that a user may conveniently find the password image In step S102, the terminal device acquires, based on the selected authentication image, a password that is to be

8 US 2016/ A1 Sep. 8, 2016 Verified. For example, a password may be acquired by a preset algorithm according to an image selected by a user In some embodiments, the terminal device may acquire a pre-stored hash key and perform hash operation according to the hash key and the selected authentication image to obtain the password In some embodiments, before selecting the authen tication image, the user may preseta verification password in advance. For example, an application program of the terminal device may obtain a plurality of images from a terminal device and display the images to a user in a randomly arranged manner So as to allow the user to select an image as a password image. The terminal device may then generate a random number as a hash key according to the password image, and generate a verification password by the hash key and a preset hash algorithm (e.g., SHA-256 algorithm and the like). The terminal device may then securely store the random number and the Verification password in a secure storage area of the terminal device so that comparative verification may be performed when identity verification is required. For example, the operation of storing the random number and the verification password may be performed after detection by a preset secure detection program. A secure storage area, for example, may be a storage area where restriction or encryp tion of the access authority is implemented During verification of user identity, the terminal device may acquire the pre-stored random number as a hash key, and perform the hash operation according to the hash key and the authentication image selected by a user, thereby obtaining a password to be verified. The hash operation herein may be the same as the hash algorithm used when a verifica tion password is set. In doing so, the password obtained by the same hash key may be the same as the preset verification password when the image selected by a user is the same as the preset password image In step S103, the terminal device acquires a preset Verification password and compares the preset verification password with the password to be verified to obtain a user identity authentication result For example, a preset verification password may be acquired and then compared with a password to be verified. If the password to be verified is consistent with the preset veri fication password, identity authentication may be determined to be successful. Otherwise, identity authentication may be determined to fail In the method 100 described above, a password is generated according to an image selected by a user, and compared with a preset verification password to Verify user identity. The user is required to select, from randomly arranged images, an image used when averification password is set to complete identity authentication, thereby providing simple and convenient operation. Moreover, a password image may be memorized conveniently by the user FIG. 3 is a flowchart of another exemplary method 300 for user identity authentication, consistent with some embodiments of this disclosure. The exemplary method 300 may be performed by a terminal device. Referring to FIG. 3, the method 300 includes the following steps In step S201, the terminal device generates a verifi cation password, and stores the verification password and a hash key used for generating the verification password For example, an application program may obtain a plurality of images from a terminal device and display the images to a user in a randomly arranged manner to allow the user to select one image as a password image. The application program may generate a random number according to the password image, use the random number as a hash key, and generate a verification password by the hash key and a preset hash algorithm (e.g., SHA-256 algorithm and the like). Sub sequently, the application program may securely store the random number and the generated verification password in a secure storage area of the terminal device so that comparison may be performed when identity authentication is required The operation of storing the random number and the verification password may be performed after detection by a preset secure detection program. A secure storage area, for example, may be a storage area where restriction or encryp tion of the access authority is implemented. In addition, the random number and Verification password may also be stored by an existing or possible future security technique, which is not intended to be limited by the present disclosure In step S202, when a user is required to input a password, the terminal device displays selectable authentica tion images to the user, so that the user may select an image from the displayed images. In some embodiments, the authentication images may be randomly selected from all images in the terminal device and may be randomly arranged on a display of the terminal device As shown in FIG. 2, an application program may obtain all images from a terminal device for random arrange ment, or randomly select a Subset of the images for arrange ment as authentication images to a user, where the authenti cation images include a password image used for setting a Verification password In some embodiments, the image preset as a pass word image may be placed at a random position in the authen tication images. In other embodiments, the image preset as a password image may be placed at the first page or the first few pages of the authentication images so that a user may conve niently find the image In step S203, the terminal device receives an authen tication image selected by the user. For example, a user may select the image preset as a password image from the authen tication images to perform identity authentication In step S204, the terminal device acquires a pass word to be verified based on the authentication image selected by a user and a pre-stored hash key For example, a pre-stored random number may be acquired as a hash key, and a hash operation may be per formed according to the hash key and the image, thereby obtaining the password to be verified. The hash operation herein may be the same as a hash algorithm used when a Verification password is set, and thus a password to be verified may be the same as a preset verification password where an image selected by a user is the same as a password image used when a password is set In step S205, the terminal device acquires a preset Verification password and compares the preset verification password with the password to be verified to obtain a user identity authentication result. If the password to be verified is consistent with the preset verification password, identity authentication may be determined to be successful. Other wise, identity authentication may be determined to fail In some embodiments, a backup character string password may be preset. When a user forgets or deletes the image for verification, the user may be prompted to input a character string for verifying identity. Identity authentication may be performed according to a preset character string pass

9 US 2016/ A1 Sep. 8, 2016 word, and the password image and the verification password may be reset after authentication is passed. For example, a password image may be reselected according to step S201, and an updated verification password may be generated. Other types of identity authentication methods, such as per forming verification by other pre-bound devices, may also be used when a user fails to input a correct password image. Other alternative identity authentication methods known to a person skilled in the art will not be described herein In step S206, the terminal device resets the verifica tion password if user identity authentication is passed When a user desires to change a password image, the user may be first required to pass the above identity authentication. After the authentication is passed, the user may start a password modification process. For example, the user may reselect a password image according to step S201 to update a verification password In the method 300 described above, a hash key and a verification password may be generated by a preset pass word image. In the course of verification, a password may be generated based on an authentication image selected by a user and a pre-stored hash key, and be compared with a preset verification password to verify user identity. The user is required to select, from randomly arranged authentication images, an authentication image used when a verification password is set to complete identity authentication, thereby providing simple and convenient operation. Moreover, a password image may be memorized conveniently by the user. Further, selectable authentication images may be randomly arranged in the course of verification, so as to prevent viruses Such as Trojan horses from probing the user input, thereby improving the password security. In addition, when a user forgets a password image or the password image is deleted, identity authentication may also be performed by other alter native methods so that a verification password may be reset, thereby improving the identity authentication efficiency FIG. 4 is a block diagram of an exemplary apparatus 400 for user identity authentication, consistent with some embodiments of this disclosure. Referring to FIG. 4, the apparatus 400 includes a receiving module 410, an acquiring module 420, and a verification module ) The receiving module 410 is configured to receive an authentication image selected by a user. For example, as shown in FIG.2, authentication images may be obtained from a terminal device by an application program. The obtained images may be used as authentication images which are then displayed to a user (e.g., on a display of the terminal device), and the user may select the authentication image that is preset as a password image from the displayed images to perform identity authentication In some embodiments, the authentication images may be randomly selected from all images stored in a terminal device and may be randomly arranged on a display of the terminal device The authentication image preset as a password image may be placed at a random position in the displayed images. In some implementations, the password image may be placed at the first page or the first few pages of all displayed authentication images so that a user may conveniently find the image The acquiring module 420 is configured to acquire a password to be verified based on the selected authentication image. In some embodiments, the acquiring module 420 may acquire a pre-stored random number as a hash key, and per form a hash operation based on the hash key and the image selected by a user, thereby obtaining a password to be veri fied The verification module 430 is configured to acquire a preset verification password and compare the preset verifi cation password with the password to be verified to obtain a user identity authentication result. If the password to be veri fied is consistent with the preset verification password, the verification module 430 may determine the identity authen tication to be successful. Otherwise, the verification module 430 may determine the identity authentication to fail FIG. 5 is a block diagram of another exemplary apparatus 500 for user identity authentication, consistent with some embodiments of this disclosure. Referring to FIG. 5, the apparatus 500 includes a receiving module 410, an acquiring module 420, a verification module 430, an initializing module 540, a storing module 550, a display module 560, and a resetting module 570. The acquiring module 420 includes a first acquiring Submodule 521 and a first processing Submod ule The initializing module 540 is configured to set the verification password. As shown in FIG. 5, the initializing module 540 includes a second acquiring submodule 541, a generating Submodule 542, and a second processing Submod ule 543. The second acquiring submodule 541 is configured to acquire an authentication image selected by a user for verification. The generating submodule 542 is configured to generate a random number. The second processing Submod ule 543 is configured to use the random number as a hash key, and perform a hash operation based on the hash key and the authentication image selected by the user to obtain a verifi cation password In some embodiments, an application program may obtain all images from a terminal device and display the images to a user in a randomly arranged manner to allow the user to select one image as a password image. The generating Submodule 542 may be configured to generate a random number according to the password image. The second pro cessing Submodule 543 may be configured to use the random number as a hash key, and generate averification password by the hash key and a preset hash algorithm (e.g., SHA-256 algorithm and the like) The storing module 550 is configured to store the random number and the Verification password. The storing module 550 may be configured to securely store the random number and the generated verification password in a secure storage area of the terminal device, so that comparison may be performed for identity authentication The operation of storing the random number and the verification password may be performed after detection by a preset secure detection program. A secure storage area, for example, may be a storage area where restriction or encryp tion of the access authority is implemented. In addition, the random number and Verification password may also be stored by an existing or possible future security technique, which is not intended to be limited by the present disclosure The display module 560 is configured to display selectable authentication images to a user when the user is required to input a password, so that the user may select an authentication image from the displayed images. The authen tication images may be randomly selected from a Subset of or all images in the terminal device and may be randomly arranged. As shown in FIG. 2, the display module 560 may obtain all images from a terminal device for random arrange

10 US 2016/ A1 Sep. 8, 2016 ment, or randomly select a Subset of the images for arrange ment as authentication images which are then displayed to a user, where the authentication images include a password image used for setting a verification password In some embodiments, the display module 560 may be configured to place the image preset as a password image at a random position in the displayed images. In other embodiments, the image preset as a password image may be placed at the first page or the first few pages of the authenti cation images so that a user may conveniently find the image In some embodiments, the authentication images may be transmitted in real time via networks, such as mobile data networks, WiFi, Bluetooth, infrared transmission, and so on. In some embodiments, when authentication images are transmitted in real time via networks, the source of the authentication images may be designated by users. A terminal device may be configured to start a corresponding function for receiving the network images. For example, a user may enable an image receiving function of the terminal device, Such that images may be transmitted in real time via the mobile data network The first acquiring submodule 521 is configured to acquire a pre-stored hash key after receiving an authentica tion image selected by a user. The first processing Submodule 522 is configured to performahash operation according to the hash key and the received image to obtain the password to be Verified. The hash operation may be the same as a hash algo rithm used for setting the verification password. Such that a password to be verified may be the same as the preset verifi cation password when the authentication image selected by a user is the same as the password image used to set the verifi cation password The resetting module 570 is configured to reset the Verification password after user identity authentication is passed. When a user desires to replace a password image, the user may be first required to pass the above identity authen tication. After the authentication is passed, the resetting mod ule 570 may be configured to start a password modification process and prompt the user to reselect a password image so as to update a verification password In some embodiments, a backup character string password may be preset. When a user forgets or deletes the password image, the verification module 430 may be config ured to authenticate the user according to a preset character string, and reset the Verification password after authentication is passed. Other types of identity authentication methods, Such as performing verification by other pre-bound devices, may also be used when a user fails to input a correct password image. Other alternative identity authentication methods known to a person skilled in the art will not be described herein In exemplary embodiments, a non-transitory com puter-readable storage medium including instructions is also provided, and the instructions may be executed by a device (such as a client terminal, a personal computer, or the like), for performing the above-described methods. The above-de scribed methods may be implemented in a distributed com puting environment, where one or more steps may be executed by a remote processing device connected through a network. The instructions executable by a device for perform ing the above-described methods may be stored in a local non-transitory computer-readable storage medium or in a computer-readable storage medium located in a remote device It should be noted that, the relational terms herein such as first and second are used only to differentiate an entity or operation from another entity or operation, and do not require or imply any actual relationship or sequence between these entities or operations. Moreover, the words comprising. having. containing, and including, and other similar forms are intended to be equivalent in meaning and be open ended in that an item or items following any one of these words is not meant to be an exhaustive listing of Such item or items, or meant to be limited to only the listed item or items The illustrated steps in the above-described figures are set out to explain the exemplary embodiments shown, and it should be anticipated that ongoing technological develop ment will change the manner in which particular functions are performed. Thus, these examples are presented herein for purposes of illustration, and not limitation. For example, steps or processes disclosed herein are not limited to being performed in the order described, but may be performed in any order, and some steps may be omitted, consistent with disclosed embodiments One of ordinary skill in the art will understand that the above described embodiments may be implemented by hardware, or Software (program codes), or a combination of hardware and software. If implemented by software, it may be stored in the above-described computer-readable media. The software, when executed by the processor may perform the disclosed methods. If implemented by hardware, the above described embodiments may be implemented by one of the following techniques known in the art or a combination thereof: a discrete logic circuit having a logic gate circuit for realizing a logic function of a data signal, an application specific integrated circuit having an appropriate combination logic gate circuit, a programmable gate array (PGA), a field programmable gate array (FPGA), etc. The computing units and the other functional units described in this disclosure may be implemented by hardware, or software, or a combination of hardware and software. One of ordinary skill in the art will also understand that multiple ones of the above described modules/units may be combined as one module/unit, and each of the above described modules/units may be further divided into a plurality of sub-modules/sub-units Other embodiments of the invention will be appar ent to those skilled in the art from consideration of the speci fication and practice of the invention disclosed here. This application is intended to cover any variations, uses, or adap tations of the invention following the general principles thereof and including such departures from the present dis closure as come within known or customary practice in the art. It is intended that the specification and examples be con sidered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims It will be appreciated that the present invention is not limited to the exact construction that has been described above and illustrated in the accompanying drawings, and that various modifications and changes may be made without departing from the scope thereof. It is intended that the scope of the invention should only be limited by the appended claims. What is claimed is: 1. A method for user identity authentication, comprising: receiving an authentication image selected by a user; acquiring, based on the authentication image, a password to be verified;

11 US 2016/ A1 Sep. 8, 2016 acquiring a preset verification password; and comparing the Verification password with the password to be verified to obtain a user identity authentication result. 2. The method of claim 1, wherein acquiring the password to be verified comprises: acquiring a pre-stored hash key; and performing a hash operation based on the hash key and the authentication image to obtain the password to be veri fied. 3. The method of claim 1, further comprising setting the Verification password before receiving the authentication image. 4. The method of claim 3, wherein setting the verification password comprises: acquiring a password image selected by the user; generating a random number as a hash key; and performing a hash operation according to the hash key and the password image to obtain the verification password. 5. The method of claim 1, further comprising: displaying a plurality of selectable authentication images on a display of a terminal device before receiving the authentication image selected by the user. 6. The method of claim 1, further comprising: after obtaining the user identity authentication result, reset ting the verification password if user identity authenti cation is passed. 7. The method of claim 1, further comprising: authenticating the user according to a preset character String; and resetting the verification password after authentication is passed. 8. An apparatus for user identity authentication, compris ing: a receiving module configured to receive an authentication image selected by a user; an acquiring module configured to acquire, based on the authentication image, a password to be verified; and a verification module configured to: acquire a preset verification password; and compare the verification password with the password to be verified to obtain a user identity authentication result. 9. The apparatus of claim 8, wherein the acquiring module comprises: a first acquiring Submodule configured to acquiring a pre stored hash key; and a first processing Submodule configured to perform a hash operation based on the hash key and the authentication image to obtain the password to be verified. 10. The apparatus of claim 8, further comprising an initial izing module configured to set the verification password before receiving the authentication image. 11. The apparatus of claim 10, wherein the initializing module comprises: a second acquiring Submodule configured to acquire a password image selected by the user; a generating Submodule configured to generate a random number as a hash key; and a second processing Submodule configured to perform a hash operation according to the hash key and the pass word image to obtain the Verification password. 12. The apparatus of claim 8, further comprising a display module configured to display a plurality of selectable authen tication images on a display of a terminal device before the receiving module receives the authentication image selected by the user. 13. The apparatus of claim8, further comprising a resetting module configured to: after obtaining the user identity authentication result, reset the verification password if user identity authentication is passed. 14. The apparatus of claim8, wherein the verification mod ule is further configured to authenticate the user according to a preset character String and reset the verification password after authentication is passed. 15. A non-transitory computer-readable storage medium having stored therein instructions that, when executed by a processor in a device, cause the device to perform operations including: receiving an authentication image selected by a user; acquiring, based on the authentication image, a password to be verified; acquiring a preset verification password; and comparing the verification password with the password to be verified to obtain a user identity authentication result. 16. The non-transitory computer-readable storage medium of claim 15, wherein acquiring the password to be verified comprises: acquiring a pre-stored hash key; and performing a hash operation based on the hash key and the authentication image to obtain the password to be veri fied. 17. The non-transitory computer-readable storage medium of claim 15, wherein the operations further comprise setting the verification password before receiving the authentication image. 18. The non-transitory computer-readable storage medium of claim 17, wherein setting the verification password com prises: acquiring a password image selected by the user; generating a random number as a hash key; and performing a hash operation according to the hash key and the password image to obtain the verification password. 19. The non-transitory computer-readable storage medium of claim 15, wherein the operations further comprise: after obtaining the user identity authentication result, reset ting the verification password if user identity authenti cation is passed. 20. The non-transitory computer-readable storage medium of claim 15, wherein the operations further comprise: authenticating the user according to a preset character String; and resetting the verification password after authentication is passed.

(12) Patent Application Publication (10) Pub. No.: US 2004/ A1

(12) Patent Application Publication (10) Pub. No.: US 2004/ A1 (19) United States US 2004O231004A1 (12) Patent Application Publication (10) Pub. No.: US 2004/0231004 A1 Seo (43) Pub. Date: (54) HTTP BASED VIDEO STREAMING APPARATUS AND METHOD IN MOBILE COMMUNICATION

More information

(12) Patent Application Publication (10) Pub. No.: US 2010/ A1. Breiner et al. (43) Pub. Date: Mar. 4, 2010

(12) Patent Application Publication (10) Pub. No.: US 2010/ A1. Breiner et al. (43) Pub. Date: Mar. 4, 2010 US 20100057686A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2010/0057686 A1 Breiner et al. (43) Pub. Date: Mar. 4, 2010 - (54) DEEP WEB SEARCH Publication Classification (76)

More information

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1 (19) United States US 20110149932A1 (12) Patent Application Publication (10) Pub. No.: US 2011/0149932 A1 KM et al. (43) Pub. Date: (54) ZIGBEE GATEWAY AND MESSAGE Publication Classification IDENTIFICATION

More information

(12) Patent Application Publication (10) Pub. No.: US 2014/ A1

(12) Patent Application Publication (10) Pub. No.: US 2014/ A1 (19) United States US 2014025631 7A1 (12) Patent Application Publication (10) Pub. No.: US 2014/0256317 A1 ZHAO et al. (43) Pub. Date: (54) (71) (72) (73) (21) (22) (63) (30) METHOD, APPARATUS, AND SYSTEM

More information

Xying. GoD-12 ACL 1-1. (12) Patent Application Publication (10) Pub. No.: US 2009/ A1. (19) United States SUPPLIER POLICY DRIVER/-108 PLATFORM

Xying. GoD-12 ACL 1-1. (12) Patent Application Publication (10) Pub. No.: US 2009/ A1. (19) United States SUPPLIER POLICY DRIVER/-108 PLATFORM (19) United States US 20090172797A1 (12) Patent Application Publication (10) Pub. No.: US 2009/0172797 A1 Yao et al. (43) Pub. Date: Jul. 2, 2009 (54) METHOD AND SYSTEM FOR SECURING APPLICATION PROGRAMINTERFACES

More information

Selecting init r. Associating. Authenticating Unit Master Key. (12) Patent Application Publication (10) Pub. No.: US 2007/ A1.

Selecting init r. Associating. Authenticating Unit Master Key. (12) Patent Application Publication (10) Pub. No.: US 2007/ A1. (19) United States US 20070153732A1 (12) Patent Application Publication (10) Pub. No.: US 2007/0153732 A1 Yao (43) Pub. Date: Jul. 5, 2007 (54) METHOD FOR AWIRELESS LOCAL AREA NETWORK TERMINAL TO ACCESS

More information

US A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2015/ A1 HUI (43) Pub. Date: Mar.

US A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2015/ A1 HUI (43) Pub. Date: Mar. US 20150067353A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2015/0067353 A1 HUI (43) Pub. Date: Mar. 5, 2015 (54) STORAGE MANAGEMENT DEVICE AND (52) US. Cl. STORAGE MANAGEMENT

More information

(12) Patent Application Publication (10) Pub. No.: US 2016/ A1

(12) Patent Application Publication (10) Pub. No.: US 2016/ A1 US 2016O156189A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2016/0156189 A1 Ci (43) Pub. Date: Jun. 2, 2016 (54) CLOUD BASED ENERGY SYSTEM (52) U.S. Cl. CPC. H02J 3/32 (2013.01);

More information

(12) United States Patent

(12) United States Patent US007107617B2 (12) United States Patent Hursey et al. (10) Patent No.: (45) Date of Patent: Sep. 12, 2006 (54) MALWARE SCANNING OF COMPRESSED COMPUTER S (75) Inventors: Nell John Hursey, Hertfordshire

More information

(12) Patent Application Publication (10) Pub. No.: US 2014/ A1

(12) Patent Application Publication (10) Pub. No.: US 2014/ A1 (19) United States US 20140282538A1 (12) Patent Application Publication (10) Pub. No.: US 2014/0282538A1 ConoVer et al. ( 43) Pub. Date: Sep. 18, 2014 (54) (71) (72) (73) (21) (22) (60) MINIMIZING SCSI

More information

(12) Patent Application Publication (10) Pub. No.: US 2013/ A1

(12) Patent Application Publication (10) Pub. No.: US 2013/ A1 (19) United States US 2013 O142354A1 (12) Patent Application Publication (10) Pub. No.: US 2013/0142354 A1 KRIEGEL (43) Pub. Date: Jun. 6, 2013 (54) METHOD AND APPARATUS FOR (30) Foreign Application Priority

More information

Printer. Data input/ Printout unit. processor) Control unit. (Raster image RIP. Display unit. Image

Printer. Data input/ Printout unit. processor) Control unit. (Raster image RIP. Display unit. Image (19) United States US 20070057978A1 (12) Patent Application Publication (10) Pub. No.: US 2007/0057978A1 Hagiwara (43) Pub. Date: Mar. 15, 2007 (54) PRINTER AND PRINTING METHOD (75) Inventor: Takahiro

More information

(12) Patent Application Publication (10) Pub. No.: US 2012/ A1

(12) Patent Application Publication (10) Pub. No.: US 2012/ A1 (19) United States US 2012O100868A1 (12) Patent Application Publication (10) Pub. No.: US 2012/0100868 A1 KM et al. (43) Pub. Date: Apr. 26, 2012 (54) METHOD AND APPARATUS FOR Publication Classification

More information

(12) United States Patent (10) Patent No.: US 7,640,289 B2

(12) United States Patent (10) Patent No.: US 7,640,289 B2 USOO7640289B2 (12) United States Patent (10) Patent No.: Chen (45) Date of Patent: *Dec. 29, 2009 (54) INTELLIGENT COMPUTER SWITCH 6,388,658 B1 5/2002 Ahern et al. 6,567,869 B2 5/2003 Shirley (75) Inventor:

More information

(12) Patent Application Publication (10) Pub. No.: US 2012/ A1. Hsu et al. (43) Pub. Date: Jan. 26, 2012

(12) Patent Application Publication (10) Pub. No.: US 2012/ A1. Hsu et al. (43) Pub. Date: Jan. 26, 2012 US 20120023517A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2012/0023517 A1 Hsu et al. (43) Pub. Date: Jan. 26, 2012 (54) METHOD AND SYSTEM FOR MEASURING AN INTERNET PROTOCOL

More information

(12) (10) Patent No.: US 9,588,741 B2. Liberant (45) Date of Patent: Mar. 7, 2017

(12) (10) Patent No.: US 9,588,741 B2. Liberant (45) Date of Patent: Mar. 7, 2017 United States Patent USOO9588.741B2 (12) () Patent No.: Liberant (45) Date of Patent: Mar. 7, 2017 (54) METHODS, APPARATUSES AND 2006/0059464 A1 3/2006 Jameson... 717/120 COMPUTER PROGRAMI PRODUCTS FOR

More information

(12) Patent Application Publication (10) Pub. No.: US 2012/ A1

(12) Patent Application Publication (10) Pub. No.: US 2012/ A1 (19) United States US 20120194446A1 (12) Patent Application Publication (10) Pub. No.: US 2012/0194446 A1 LIN et al. (43) Pub. Date: Aug. 2, 2012 (54) ELECTRONIC DEVICE AND METHOD FOR (30) Foreign Application

More information

(12) Patent Application Publication (10) Pub. No.: US 2005/ A1

(12) Patent Application Publication (10) Pub. No.: US 2005/ A1 (19) United States US 20050281269A1 (12) Patent Application Publication (10) Pub. No.: US 2005/0281269 A1 Choi (43) Pub. Date: (54) MOBILE TELECOMMUNICATION SYSTEM (30) Foreign Application Priority Data

More information

(12) United States Patent (10) Patent No.: US 9,198,206 B2

(12) United States Patent (10) Patent No.: US 9,198,206 B2 US009 1982O6B2 (12) United States Patent () Patent No.: US 9,198,206 B2 Li et al. (45) Date of Patent: Nov. 24, 2015 (54) AUTOMATIC CONNECTION METHOD AND (56) References Cited APPARATUS BETWEEN AN AUTOMOBILE

More information

(12) Patent Application Publication (10) Pub. No.: US 2008/ A1

(12) Patent Application Publication (10) Pub. No.: US 2008/ A1 (19) United States US 2008.0068375A1 (12) Patent Application Publication (10) Pub. No.: US 2008/0068375 A1 Min et al. (43) Pub. Date: Mar. 20, 2008 (54) METHOD AND SYSTEM FOR EARLY Z (30) Foreign Application

More information

(12) Patent Application Publication (10) Pub. No.: US 2006/ A1

(12) Patent Application Publication (10) Pub. No.: US 2006/ A1 (19) United States US 2006.0062400A1 (12) Patent Application Publication (10) Pub. No.: Chia-Chun (43) Pub. Date: Mar. 23, 2006 (54) BLUETOOTH HEADSET DEVICE CAPABLE OF PROCESSING BOTH AUDIO AND DIGITAL

More information

(12) Patent Application Publication (10) Pub. No.: US 2005/ A1

(12) Patent Application Publication (10) Pub. No.: US 2005/ A1 (19) United States US 2005O125217A1 (12) Patent Application Publication (10) Pub. No.: US 2005/0125217 A1 MaZOr (43) Pub. Date: Jun. 9, 2005 (54) SERVER-BASED SPELL CHECK ENGINE (52) U.S. Cl.... 704/1

More information

(12) Patent Application Publication (10) Pub. No.: US 2008/ A1

(12) Patent Application Publication (10) Pub. No.: US 2008/ A1 (19) United States US 20080244164A1 (12) Patent Application Publication (10) Pub. No.: US 2008/0244164 A1 Chang et al. (43) Pub. Date: Oct. 2, 2008 (54) STORAGE DEVICE EQUIPPED WITH NAND FLASH MEMORY AND

More information

(12) Patent Application Publication (10) Pub. No.: US 2016/ A1. PARK et al. (43) Pub. Date: Mar. 24, 2016

(12) Patent Application Publication (10) Pub. No.: US 2016/ A1. PARK et al. (43) Pub. Date: Mar. 24, 2016 US 20160085322A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2016/0085322 A1 PARK et al. (43) Pub. Date: Mar. 24, 2016 (54) WIRELESS MOUSE, MOUSE PAD AND Publication Classification

More information

(12) Patent Application Publication (10) Pub. No.: US 2012/ A1

(12) Patent Application Publication (10) Pub. No.: US 2012/ A1 (19) United States US 20120047545A1 (12) Patent Application Publication (10) Pub. No.: US 2012/0047545 A1 SELLERS et al. (43) Pub. Date: Feb. 23, 2012 (54) TOPOGRAPHIC FRAUD DETECTION (52) U.S. Cl....

More information

(12) Patent Application Publication (10) Pub. No.: US 2015/ A1. (51) Int. Cl. (52) U.S. Cl COMMUNICATIONS

(12) Patent Application Publication (10) Pub. No.: US 2015/ A1. (51) Int. Cl. (52) U.S. Cl COMMUNICATIONS (19) United States (12) Patent Application Publication (10) Pub. No.: US 2015/0036568 A1 HWANG US 2015.0036568A1 (43) Pub. Date: Feb. 5, 2015 (54) (71) (72) (73) (21) (22) (30) WIRELESS COMMUNICATIONSTERMINAL

More information

(12) Patent Application Publication (10) Pub. No.: US 2012/ A1. (19) United States. Frequency. Oh et al. (43) Pub. Date: Jan.

(12) Patent Application Publication (10) Pub. No.: US 2012/ A1. (19) United States. Frequency. Oh et al. (43) Pub. Date: Jan. (19) United States US 201200 14334A1 (12) Patent Application Publication (10) Pub. No.: US 2012/0014334 A1 Oh et al. (43) Pub. Date: Jan. 19, 2012 (54) METHOD AND APPARATUS FOR MANAGING RESOURCES FOR P2P

More information

Gammalcode. Frame 1, Frame 2. drive signal. (12) Patent Application Publication (10) Pub. No.: US 2016/ A1. Timing code.

Gammalcode. Frame 1, Frame 2. drive signal. (12) Patent Application Publication (10) Pub. No.: US 2016/ A1. Timing code. (19) United States US 20160104.405A1 (12) Patent Application Publication (10) Pub. No.: US 2016/0104405 A1 Fang et al. (43) Pub. Date: Apr. 14, 2016 (54) DRIVE CIRCUIT AND DISPLAY DEVICE (71) Applicant:

More information

(12) United States Patent (10) Patent No.: US 7, B2

(12) United States Patent (10) Patent No.: US 7, B2 USOO7561411 B2 (12) United States Patent (10) Patent No.: US 7,561.411 B2 Johnson, Jr. (45) Date of Patent: Jul. 14, 2009 (54) UNINTERRUPTIBLE POWER DISTRIBUTION 7,400,066 B2 * 7/2008 Tassitino et al....

More information

(12) Patent Application Publication (10) Pub. No.: US 2017/ A1

(12) Patent Application Publication (10) Pub. No.: US 2017/ A1 (19) United States US 2017009 1001A1 (12) Patent Application Publication (10) Pub. No.: US 2017/0091001 A1 PANDEY et al. (43) Pub. Date: (54) METHOD AND SYSTEM FOR MANAGING (52) U.S. Cl. AND LINKING SOFTWARE

More information

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1 US 2011 O270691A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2011/0270691 A1 Park (43) Pub. Date: Nov. 3, 2011 (54) METHOD AND SYSTEM FOR PROVIDING Publication Classification

More information

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1 (19) United States US 2011 0004845A1 (12) Patent Application Publication (10) Pub. No.: US 2011/0004845 A1 Ciabarra (43) Pub. Date: Jan. 6, 2011 (54) METHOD AND SYSTEM FOR NOTIFYINGA USER OF AN EVENT OR

More information

(12) United States Patent (10) Patent No.: US 8,253,777 B2

(12) United States Patent (10) Patent No.: US 8,253,777 B2 US008253777B2 (12) United States Patent (10) Patent No.: US 8,253,777 B2 Lin (45) Date of Patent: Aug. 28, 2012 (54) PANORAMIC CAMERA WITH A PLURALITY 7,424,218 B2 * 9/2008 Baudisch et al.... 396,322 OF

More information

/ client computer. \ single sign-on. application program server (AP) network. server (SS0) (12) United States Patent Hsieh et a].

/ client computer. \ single sign-on. application program server (AP) network. server (SS0) (12) United States Patent Hsieh et a]. US007278155B2 (12) United States Patent Hsieh et a]. (10) Patent N0.: (45) Date of Patent: US 7,278,155 B2 Oct. 2, 2007 (54) (75) (73) (*) (21) (22) (65) (30) Foreign Application Priority Data Oct. 22,

More information

(12) Patent Application Publication (10) Pub. No.: US 2006/ A1. Choi et al. (43) Pub. Date: Apr. 27, 2006

(12) Patent Application Publication (10) Pub. No.: US 2006/ A1. Choi et al. (43) Pub. Date: Apr. 27, 2006 US 20060090088A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2006/0090088 A1 Choi et al. (43) Pub. Date: Apr. 27, 2006 (54) METHOD AND APPARATUS FOR Publication Classification

More information

(12) Patent Application Publication (10) Pub. No.: US 2004/ A1. Lin et al. (43) Pub. Date: Sep. 30, 2004

(12) Patent Application Publication (10) Pub. No.: US 2004/ A1. Lin et al. (43) Pub. Date: Sep. 30, 2004 (19) United States US 20040189577A1 (12) Patent Application Publication (10) Pub. No.: Lin et al. (43) Pub. Date: Sep. 30, 2004 (54) PIXEL CIRCUIT FOR LIQUID CRYSTAL (30) Foreign Application Priority Data

More information

(12) Patent Application Publication (10) Pub. No.: US 2006/ A1

(12) Patent Application Publication (10) Pub. No.: US 2006/ A1 (19) United States US 20060O881 67A1 (12) Patent Application Publication (10) Pub. No.: US 2006/0088167 A1 Bade et al. (43) Pub. Date: Apr. 27, 2006 (54) METHOD AND SYSTEM FOR BACKUP AND RESTORE OF A CONTEXT

More information

(12) Patent Application Publication (10) Pub. No.: US 2009/ A1

(12) Patent Application Publication (10) Pub. No.: US 2009/ A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2009/0222841 A1 Mirajkar et al. US 20090222841A1 (43) Pub. Date: Sep. 3, 2009 (54) (75) (73) (21) (22) ACCELERATION OF RECEIVE DATA

More information

(12) Patent Application Publication (10) Pub. No.: US 2017/ A1

(12) Patent Application Publication (10) Pub. No.: US 2017/ A1 (19) United States US 20170041819A1 (12) Patent Application Publication (10) Pub. No.: US 2017/0041819 A1 W (43) Pub. Date: Feb. 9, 2017 (54) DEVICE AND METHOD OF HANDLING (52) U.S. Cl. WIRELESS LOCAL

More information

(12) Patent Application Publication (10) Pub. No.: US 2013/ A1

(12) Patent Application Publication (10) Pub. No.: US 2013/ A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2013/0024764 A1 LOu et al. US 2013 OO24764A1 (43) Pub. Date: Jan. 24, 2013 (54) (75) (73) (21) (22) (86) (30) METHOD FORTRANSFORMINGWEB

More information

(12) Patent Application Publication (10) Pub. No.: US 2016/ A1

(12) Patent Application Publication (10) Pub. No.: US 2016/ A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2016/0234591 A1 Sanger et al. US 2016O234591 A1 (43) Pub. Date: Aug. 11, 2016 (54) (71) (72) (21) (22) (30) MCROPHONE MODULE WITH

More information

(12) Patent Application Publication (10) Pub. No.: US 2015/ A1

(12) Patent Application Publication (10) Pub. No.: US 2015/ A1 (19) United States US 20150332058A1 (12) Patent Application Publication (10) Pub. No.: US 2015/0332058 A1 Chen et al. (43) Pub. Date: Nov. 19, 2015 (54) METHOD FORENCRYPTING A 3D MODEL FILE AND SYSTEM

More information

(12) Patent Application Publication (10) Pub. No.: US 2006/ A1

(12) Patent Application Publication (10) Pub. No.: US 2006/ A1 US 2006O1981 75A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2006/0198175 A1 Badawi et al. (43) Pub. Date: Sep. 7, 2006 (54) METHOD, SYSTEM, AND APPARATUS HIGH (22) Filed:

More information

(12) Patent Application Publication (10) Pub. No.: US 2007/ A1

(12) Patent Application Publication (10) Pub. No.: US 2007/ A1 (19) United States US 20070073878A1 (12) Patent Application Publication (10) Pub. No.: US 2007/0073878A1 Issa (43) Pub. Date: Mar. 29, 2007 (54) SYSTEM AND METHOD FOR LOWERING (52) U.S. Cl.... 709/225

More information

(12) Patent Application Publication (10) Pub. No.: US 2016/ A1

(12) Patent Application Publication (10) Pub. No.: US 2016/ A1 US 201603 00023A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2016/0300023 A1 Leonard (43) Pub. Date: Oct. 13, 2016 (54) PROVIDER RATING SYSTEM (52) U.S. Cl. CPC... G06F 19/327

More information

(12) Patent Application Publication (10) Pub. No.: US 2015/ A1

(12) Patent Application Publication (10) Pub. No.: US 2015/ A1 US 20150358424A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2015/0358424 A1 BRAUN et al. (43) Pub. Date: Dec. 10, 2015 (54) SYSTEMAND METHOD FOR PROVIDING (52) U.S. Cl. DATABASE

More information

(FSN JSO (12) Patent Application Publication (10) Pub. No.: US 2005/ A1. (19) United States

(FSN JSO (12) Patent Application Publication (10) Pub. No.: US 2005/ A1. (19) United States (19) United States US 2005O146349A1 (12) Patent Application Publication (10) Pub. No.: US 2005/0146349 A1 Lai et al. (43) Pub. Date: Jul. 7, 2005 (54) TESTINGAPPARATUS FOR FLAT-PANEL DISPLAY (76) Inventors:

More information

(12) Patent Application Publication (10) Pub. No.: US 2016/ A1

(12) Patent Application Publication (10) Pub. No.: US 2016/ A1 US 2016.0381 000A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2016/0381000 A1 Mathew et al. (43) Pub. Date: (54) SESSION ACTIVITY TRACKING FOR (52) U.S. Cl. SESSION ADOPTION

More information

(12) Patent Application Publication (10) Pub. No.: US 2002/ A1

(12) Patent Application Publication (10) Pub. No.: US 2002/ A1 (19) United States US 20020040308A1 (12) Patent Application Publication (10) Pub. No.: US 2002/0040308A1 Hasegawa et al. (43) Pub. Date: Apr. 4, 2002 (54) METHOD OF VALIDATING ENTRANCE TO (30) Foreign

More information

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1 (19) United States US 20110239111A1 (12) Patent Application Publication (10) Pub. No.: US 2011/0239111A1 GROVER (43) Pub. Date: Sep. 29, 2011 (54) SPELL CHECKER INTERFACE (52) U.S. Cl.... 715/257; 715/764;

More information

$26) 6, 2. (12) Patent Application Publication (10) Pub. No.: US 2013/ A1. (19) United States Chien (43) Pub. Date: Jun.

$26) 6, 2. (12) Patent Application Publication (10) Pub. No.: US 2013/ A1. (19) United States Chien (43) Pub. Date: Jun. (19) United States US 2013 0147960A1 (12) Patent Application Publication (10) Pub. No.: US 2013/0147960 A1 Chien (43) Pub. Date: Jun. 13, 2013 (54) PLUG AND PLAYNETWORKSYSTEM, PLUG AND PLAYNETWORKVIDEO

More information

(12) Patent Application Publication (10) Pub. No.: US 2006/ A1

(12) Patent Application Publication (10) Pub. No.: US 2006/ A1 (19) United States US 200601 01189A1 (12) Patent Application Publication (10) Pub. No.: US 2006/0101189 A1 Chandrasekaran et al. (43) Pub. Date: (54) SYSTEM AND METHOD FOR HOT (52) U.S. Cl.... 711 f6 CLONING

More information

(12) United States Patent (10) Patent No.: US 8,536,920 B2 Shen

(12) United States Patent (10) Patent No.: US 8,536,920 B2 Shen l 1 L L IL L. I 1 L _ I L L L L US008536920B2 (12) United States Patent (10) Patent No.: US 8,536,920 B2 Shen (45) Date of Patent: Sep. 17, 2013 (54) CLOCK CIRCUIT WITH DELAY FUNCTIONS AND RELATED METHOD

More information

(12) Patent Application Publication (10) Pub. No.: US 2016/ A1

(12) Patent Application Publication (10) Pub. No.: US 2016/ A1 (19) United States US 20160372114A1 (12) Patent Application Publication (10) Pub. No.: US 2016/0372114A1 Klose et al. (43) Pub. Date: (54) ANNOUNCEMENT SIGNALING ON BOARD H04W 68/00 (2006.01) AN AIRCRAFT

More information

(12) Patent Application Publication (10) Pub. No.: US 2008/ A1

(12) Patent Application Publication (10) Pub. No.: US 2008/ A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2008/0317029 A1 TASAK et al. US 20080317029A1 (43) Pub. Date: Dec. 25, 2008 (54) (75) (73) (21) (22) (60) UNICAST/MULTICAST SYSTEM

More information

(73) Assignee: Nokia Networks Oy (FI) Wii: 12: 'We (*) Notice: Subject to any disclaimer, the term of this * cited by examiner

(73) Assignee: Nokia Networks Oy (FI) Wii: 12: 'We (*) Notice: Subject to any disclaimer, the term of this * cited by examiner USOO6246871B1 12) United States Patent 10) Patent No.: US 6,246,871 B1 9 9 Ala-Laurila (45) Date of Patent: Jun. 12, 2001 (54) METHOD AND APPARATUS FOR 5,941,946 8/1999 Baldwin et al.. PROVIDING ACCESS

More information

(12) Patent Application Publication (10) Pub. No.: US 2014/ A1

(12) Patent Application Publication (10) Pub. No.: US 2014/ A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2014/0007215 A1 Roman0 et al. US 2014.0007215A1 (43) Pub. Date: Jan. 2, 2014 (54) (71) (72) (21) (22) (60) MOBILE APPLICATIONS PLATFORM

More information

(12) Patent Application Publication (10) Pub. No.: US 2006/ A1

(12) Patent Application Publication (10) Pub. No.: US 2006/ A1 (19) United States US 20060041739A1 (12) Patent Application Publication (10) Pub. No.: US 2006/0041739 A1 Iwakura et al. (43) Pub. Date: Feb. 23, 2006 (54) MEMORY DUMP GENERATION WITH (52) U.S. Cl....

More information

(12) Patent Application Publication (10) Pub. No.: US 2007/ A1

(12) Patent Application Publication (10) Pub. No.: US 2007/ A1 US 20070276982A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2007/0276982 A1 Denning (43) Pub. Date: (54) THIRD SWITCH FOR VXS/VMEBUS (57) COMPLIANT COMPUTING SYSTEM (76) Inventor:

More information

(12) Patent Application Publication (10) Pub. No.: US 2010/ A1

(12) Patent Application Publication (10) Pub. No.: US 2010/ A1 (19) United States US 2010.019 1896A1 (12) Patent Application Publication (10) Pub. No.: US 2010/0191896 A1 Yang et al. (43) Pub. Date: Jul. 29, 2010 (54) SOLID STATE DRIVE CONTROLLER WITH FAST NVRAM BUFFER

More information

(12) Patent Application Publication (10) Pub. No.: US 2009/ A1

(12) Patent Application Publication (10) Pub. No.: US 2009/ A1 US 2009.01430 12A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2009/0143012 A1 JEON (43) Pub. Date: Jun. 4, 2009 (54) BLUETOOTH-ENABLED MOBILE Publication Classification TERMINAL

More information

(12) United States Patent (10) Patent No.: US 7,917,832 B2

(12) United States Patent (10) Patent No.: US 7,917,832 B2 US007.917832B2 (12) United States Patent (10) Patent No.: US 7,917,832 B2 Hsieh et al. (45) Date of Patent: Mar. 29, 2011 (54) APPARATUS FOR IMPROVING DATA 6,725,321 B1 4/2004 Sinclair et al.... T11 103

More information

(12) United States Patent

(12) United States Patent (12) United States Patent Beck et al. USOO6842611B2 (10) Patent No.: (45) Date of Patent: Jan. 11, 2005 (54) RECEIVED DATA PROCESSING METHOD IN COMMUNICATION DEVICE FOR SUPPORTING WIRELESS COMMUNICATION

More information

(12) Patent Application Publication (10) Pub. No.: US 2010/ A1

(12) Patent Application Publication (10) Pub. No.: US 2010/ A1 (19) United States US 2010.0095237A1 (12) Patent Application Publication (10) Pub. No.: US 2010/0095237 A1 Turakhia (43) Pub. Date: (54) METHOD AND SYSTEM FOR DISPLAYING (30) Foreign Application Priority

More information

(12) United States Patent (10) Patent No.: US 9,325,795 B2

(12) United States Patent (10) Patent No.: US 9,325,795 B2 US009325795B2 (12) United States Patent () Patent No.: Kim et al. () Date of Patent: Apr. 26, 2016 (54) METHOD OF AND SYSTEM FOR PROVIDING (58) Field of Classification Search (75) (73) (*) (21) (22) ()

More information

(12) United States Patent (10) Patent No.: US 9,399,323 B1

(12) United States Patent (10) Patent No.: US 9,399,323 B1 US0093.99323B1 (12) United States Patent (10) Patent No.: Lu et al. (45) Date of Patent: Jul. 26, 2016 (54) THREE-DIMENSIONAL PRINTING USPC... 425/470; 264/401, 497, 212, 308 STRUCTURE See application

More information

(12) Patent Application Publication (10) Pub. No.: US 2004/ A1

(12) Patent Application Publication (10) Pub. No.: US 2004/ A1 (19) United States US 2004O260967A1 (12) Patent Application Publication (10) Pub. No.: US 2004/0260967 A1 Guha et al. (43) Pub. Date: Dec. 23, 2004 (54) METHOD AND APPARATUS FOR EFFICIENT FAULTTOLERANT

More information

(12) Patent Application Publication (10) Pub. No.: US 2015/ A1

(12) Patent Application Publication (10) Pub. No.: US 2015/ A1 (19) United States US 201500 11187A1 (12) Patent Application Publication (10) Pub. No.: US 2015/0011187 A1 WetzOld (43) Pub. Date: Jan. 8, 2015 (54) LOCATION BASED S (52) U.S. Cl. CPC... H04 W4/02 (2013.01);

More information

(12) Patent Application Publication (10) Pub. No.: US 2016/ A1

(12) Patent Application Publication (10) Pub. No.: US 2016/ A1 US 20160364902A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2016/0364902 A1 Hong et al. (43) Pub. Date: (54) HIGH QUALITY EMBEDDED GRAPHICS (52) U.S. Cl. FOR REMOTE VISUALIZATION

More information

(2GEUs) (12) Patent Application Publication (10) Pub. No.: US 2008/ A1. (19) United States. Giampapa et al. (43) Pub. Date: Jul.

(2GEUs) (12) Patent Application Publication (10) Pub. No.: US 2008/ A1. (19) United States. Giampapa et al. (43) Pub. Date: Jul. (19) United States US 2008O177867A1 (12) Patent Application Publication (10) Pub. No.: US 2008/0177867 A1 Giampapa et al. (43) Pub. Date: Jul. 24, 2008 (54) CONFIGURATION OF A MEMORY CONTROLLER IN A PARALLEL

More information

(12) United States Patent (10) Patent No.: US 8, B2. Cha et al. (45) Date of Patent: Oct. 8, 2013

(12) United States Patent (10) Patent No.: US 8, B2. Cha et al. (45) Date of Patent: Oct. 8, 2013 US008554.937B2 (12) United States Patent (10) Patent No.: US 8,554.937 B2 Cha et al. (45) Date of Patent: Oct. 8, 2013 (54) METHOD AND SYSTEM FOR 6,259,701 B1* 7/2001 Shur et al.... 370/401 6,836,806 B1*

More information

(12) Patent Application Publication (10) Pub. No.: US 2016/ A1

(12) Patent Application Publication (10) Pub. No.: US 2016/ A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2016/0165014 A1 Nainar et al. US 2016O165O14A1 (43) Pub. Date: Jun. 9, 2016 (54) (71) (72) (73) (21) (22) (51) INTER-DOMAIN SERVICE

More information

(12) Patent Application Publication (10) Pub. No.: US 2007/ A1

(12) Patent Application Publication (10) Pub. No.: US 2007/ A1 (19) United States US 200700 10333A1 (12) Patent Application Publication (10) Pub. No.: US 2007/0010333 A1 Chiu et al. (43) Pub. Date: Jan. 11, 2007 (54) COMPUTER GAME DEVELOPMENT SYSTEMAND METHOD (75)

More information

(12) Patent Application Publication (10) Pub. No.: US 2017/ A1

(12) Patent Application Publication (10) Pub. No.: US 2017/ A1 US 20170069991A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2017/0069991 A1 HOmb0 (43) Pub. Date: Mar. 9, 2017 (54) ELECTRONIC APPARATUS H05K L/4 (2006.01) (71) Applicant:

More information

ED 302C A t 302B (12) Patent Application Publication (10) Pub. No.: US 2015/ A1. (19) United States

ED 302C A t 302B (12) Patent Application Publication (10) Pub. No.: US 2015/ A1. (19) United States (19) United States (12) Patent Application Publication (10) Pub. No.: US 2015/0035764 A1 Michihata et al. US 2015 0035764A1 (43) Pub. Date: Feb. 5, 2015 (54) (71) (72) (73) (21) (22) (30) DIGITIZER PEN

More information

(12) United States Patent (10) Patent No.: US 6,199,058 B1

(12) United States Patent (10) Patent No.: US 6,199,058 B1 USOO6199058B1 (12) United States Patent (10) Patent No.: US 6,199,058 B1 Wong et al. (45) Date of Patent: Mar. 6, 2001 (54) REPORT SERVER CACHING 5,168,444 12/1992 Cukor et al.... 705/1 5,625,818 4/1997

More information

(12) United States Patent

(12) United States Patent (12) United States Patent USOO6941277B2 (10) Patent No.: Imag0 (45) Date of Patent: Sep. 6, 2005 (54) METHODS AND SYSTEMS FOR PROVIDING (56) References Cited ONLINE INFORMATION FOR NETWORKED DEVICES U.S.

More information

(12) Patent Application Publication (10) Pub. No.: US 2005/ A1

(12) Patent Application Publication (10) Pub. No.: US 2005/ A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2005/0192794A1 Ertemalp et al. US 2005O192794A1 (43) Pub. Date: Sep. 1, 2005 (54) (75) (73) (21) (22) (63) SYSTEMAND METHOD FOR

More information

(12) United States Patent (10) Patent No.: US 8.131,217 B2

(12) United States Patent (10) Patent No.: US 8.131,217 B2 US008131217B2 (12) United States Patent (10) Patent No.: US 8.131,217 B2 Srinivasa et al. (45) Date of Patent: Mar. 6, 2012 (54) IDENTIFICATION OF MAKE AND MODEL 2004/0266347 A1* 12/2004 Palin et al....

More information

(JAY VO 120 STA 1. (12) Patent Application Publication (10) Pub. No.: US 2005/ A1. (19) United States PROCESSOR 160 SCHEDULER 170

(JAY VO 120 STA 1. (12) Patent Application Publication (10) Pub. No.: US 2005/ A1. (19) United States PROCESSOR 160 SCHEDULER 170 (19) United States US 2005O141495A1 (12) Patent Application Publication (10) Pub. No.: US 2005/0141495 A1 Lin et al. (43) Pub. Date: Jun. 30, 2005 (54) FILLING THE SPACE-TIME CHANNELS IN SDMA (76) Inventors:

More information

(12) United States Patent

(12) United States Patent USOO9729447B2 (12) United States Patent Wang et al. (10) Patent No.: (45) Date of Patent: US 9,729.447 B2 *Aug. 8, 2017 (54) APPARATUS AND METHOD FOR (71) (72) (73) (*) (21) (22) (65) (63) (60) (51) (52)

More information

(12) United States Patent (10) Patent No.: US 6,731,259 B2

(12) United States Patent (10) Patent No.: US 6,731,259 B2 USOO6731259B2 (12) United States Patent (10) Patent No.: US 6,731,259 B2 Yer et al. (45) Date of Patent: May 4, 2004 (54) DRIVING CIRCUIT OF A LIQUID CRYSTAL 6,121.950 A * 9/2000 Zavracky et al.... 34.5/101

More information

(12) Patent Application Publication (10) Pub. No.: US 2006/ A1

(12) Patent Application Publication (10) Pub. No.: US 2006/ A1 (19) United States US 2006O146786A1 (12) Patent Application Publication (10) Pub. No.: US 2006/0146786 A1 Lian et al. (43) Pub. Date: Jul. 6, 2006 (54) IMPLEMENTATION OF THE INTELLIGENT NETWORK IN THE

More information

(12) Patent Application Publication (10) Pub. No.: US 2006/ A1

(12) Patent Application Publication (10) Pub. No.: US 2006/ A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2006/0152762 A1 Asano et al. US 2006O152762A1 (43) Pub. Date: Jul. 13, 2006 (54) (75) (73) (21) (22) (30) IMAGE FORMING APPARATUS

More information

(12) Patent Application Publication (10) Pub. No.: US 2008/ A1

(12) Patent Application Publication (10) Pub. No.: US 2008/ A1 (19) United States US 20080215829A1 (12) Patent Application Publication (10) Pub. No.: US 2008/0215829 A1 Lin et al. (43) Pub. Date: Sep. 4, 2008 (54) OPTICAL DISC RECORDER AND BUFFER Publication Classification

More information

(12) United States Patent (10) Patent No.: US 6,655,370 B1. Beckwith (45) Date of Patent: Dec. 2, 2003

(12) United States Patent (10) Patent No.: US 6,655,370 B1. Beckwith (45) Date of Patent: Dec. 2, 2003 USOO665537OB1 (12) United States Patent (10) Patent No.: US 6,655,370 B1 Beckwith (45) Date of Patent: Dec. 2, 2003 (54) FIRECRACKER LAUNCHING DEVICE 3,794,325 * 2/1974 Stender 4,995,371. A 2/1991 Kuizinas...

More information

(12) Patent Application Publication (10) Pub. No.: US 2016/ A1

(12) Patent Application Publication (10) Pub. No.: US 2016/ A1 (19) United States US 2016037 1322A1 (12) Patent Application Publication (10) Pub. No.: US 2016/0371322 A1 GUNTI et al. (43) Pub. Date: Dec. 22, 2016 (54) EFFICIENT MANAGEMENT OF LARGE (52) U.S. Cl. NUMBER

More information

Interface Hypervisor. PV Hypervisor. (12) Patent Application Publication (10) Pub. No.: US 2013/ A1. Unmodified Guest.

Interface Hypervisor. PV Hypervisor. (12) Patent Application Publication (10) Pub. No.: US 2013/ A1. Unmodified Guest. (19) United States US 2013 0145363A1 (12) Patent Application Publication (10) Pub. No.: US 2013/0145363 A1 Eidus et al. (43) Pub. Date: (54) SYSTEMAND METHOD THEREOF FOR RUNNING AN UNMODIFIED GUEST OPERATING

More information

(12) Patent Application Publication (10) Pub. No.: US 2014/ A1

(12) Patent Application Publication (10) Pub. No.: US 2014/ A1 US 20140O82324A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2014/0082324 A1 Elhamias et al. (43) Pub. Date: Mar. 20, 2014 (54) METHOD AND STORAGE DEVICE FOR (52) U.S. Cl.

More information

(12) Patent Application Publication (10) Pub. No.: US 2016/ A1

(12) Patent Application Publication (10) Pub. No.: US 2016/ A1 (19) United States US 2016028627OA1 (12) Patent Application Publication (10) Pub. No.: US 2016/0286270 A1 YUEN (43) Pub. Date: (54) KIND OF INTERACTIVE SHARING H4N2L/214 (2006.01) PLATFORMINTEGRATING TV

More information

(12) United States Patent (10) Patent No.: US 6,657,548 B2. Dai (45) Date of Patent: Dec. 2, 2003

(12) United States Patent (10) Patent No.: US 6,657,548 B2. Dai (45) Date of Patent: Dec. 2, 2003 USOO6657548B2 (12) United States Patent (10) Patent No.: US 6,657,548 B2 Dai (45) Date of Patent: Dec. 2, 2003 (54) SYSTEMSTATUS LIGHT INDICATOR 6,501,897 B1 * 12/2002 German et al.... 385/134 DEVICE EMBEDDED

More information

(12) Patent Application Publication (10) Pub. No.: US 2010/ A1

(12) Patent Application Publication (10) Pub. No.: US 2010/ A1 (19) United States US 2010O2.19234A1 (12) Patent Application Publication (10) Pub. No.: US 2010/0219234 A1 Forbes (43) Pub. Date: Sep. 2, 2010 (54) MOBILE TICKET AUTHENTICATION Publication Classification

More information

(12) Patent Application Publication (10) Pub. No.: US 2016/ A1

(12) Patent Application Publication (10) Pub. No.: US 2016/ A1 US 2016O128237A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2016/0128237 A1 SZEREMETA (43) Pub. Date: May 5, 2016 (54) SERVER WITH STORAGE DRIVE COOLING (52) U.S. Cl. SYSTEM

More information

(12) Patent Application Publication (10) Pub. No.: US 2008/ A1

(12) Patent Application Publication (10) Pub. No.: US 2008/ A1 (19) United States US 2008.0036860A1 (12) Patent Application Publication (10) Pub. No.: US 2008/003.6860 A1 Addy (43) Pub. Date: Feb. 14, 2008 (54) PTZ PRESETS CONTROL ANALYTIUCS CONFIGURATION (76) Inventor:

More information

(12) Patent Application Publication (10) Pub. No.: US 2013/ A1

(12) Patent Application Publication (10) Pub. No.: US 2013/ A1 US 20130244475A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2013/0244475A1 Sayadi et al. (43) Pub. Date: Sep. 19, 2013 (54) WALL OUTLET WITH RETRACTABLE USB (52) U.S. Cl.

More information

(12) United States Patent (10) Patent No.: US 6,208,340 B1. Amin et al. (45) Date of Patent: Mar. 27, 2001

(12) United States Patent (10) Patent No.: US 6,208,340 B1. Amin et al. (45) Date of Patent: Mar. 27, 2001 USOO620834OB1 (12) United States Patent (10) Patent No.: US 6,208,340 B1 Amin et al. (45) Date of Patent: Mar. 27, 2001 (54) GRAPHICAL USER INTERFACE 5,317,687 5/1994 Torres... 395/159 INCLUDING A DROP-DOWN

More information

(12) Patent Application Publication (10) Pub. No.: US 2009/ A1

(12) Patent Application Publication (10) Pub. No.: US 2009/ A1 (19) United States US 2009006.3169A1 (12) Patent Application Publication (10) Pub. No.: US 2009/0063169 A1 Holloway (43) Pub. Date: Mar. 5, 2009 (54) EXTENDING INDUSTRY CERTIFICATIONS TO AN UNCERTIFED

More information

(12) Patent Application Publication (10) Pub. No.: US 2013/ A1

(12) Patent Application Publication (10) Pub. No.: US 2013/ A1 (19) United States US 2013 00277.43A1 (12) Patent Application Publication (10) Pub. No.: US 2013/0027743 A1 ENAMI (43) Pub. Date: Jan. 31, 2013 (54) APPLICATION DELIVERING SYSTEM (52) U.S. Cl.... 358/1.15

More information

(12) Patent Application Publication (10) Pub. No.: US 2007/ A1

(12) Patent Application Publication (10) Pub. No.: US 2007/ A1 (19) United States US 20070135182A1 (12) Patent Application Publication (10) Pub. No.: US 2007/0135182 A1 Hanif et al. (43) Pub. Date: (54) CELL PHONE DEVICE (75) Inventors: Sadeque Mohammad Hanif, Tokyo

More information

(12) United States Patent

(12) United States Patent USOO853.8494B2 (12) United States Patent Hsu (10) Patent No.: (45) Date of Patent: US 8,538,494 B2 Sep. 17, 2013 (54) MOBILE PHONE AND METHOD FOR TRANSFERRING BATTERY POWER OF THE MOBILE PHONE (75) Inventor:

More information